MAE201 – Competition and Industry

Application security is critical; it entails various security measures at the application level that protect any data or code in the application from theft or unauthorized access.  Application security is very critical as it takes into consideration various security measures that take place during the application design and development.  The application security course has been very educative, where I have gained a lot of knowledge through the course readings, discussion, and other students sharing. Through the course, I have learned that application security includes hardware, softwares, and other procedures and helps in the identification and minimize security vulnerabilities. 

Today’s applications have been made available through various different networks and connected to the cloud, thus increasing the vulnerabilities threats and breaches. This has greatly increased the pressure and incentive to ensure network security at the organization level and ensure the applications are well secured (Chau, 2018). One of the reasons why our organization implements application security is hackers are targeting apps nowadays than they were in the past.  Application security is critical as an organization can identify any weakness at the application level, thus putting in place various measures to help prevent this attack. 

Through the knowledge gained from this course, I have been able to carry out my mandate in the organization diligently; I work as a java developer, where my main responsibilities include designing, implementing, and maintaining various organization applications—and delivering high availability and performance applications. Through the course, I have learned that data breaches have become a very common occurrence, and the cost of breaches has reached record levels where scams are evolving where cybercriminals are using sophisticated technology to carry out their attacks. 

One of the challenges being forced by our organization is how to keep our organization well protected against cyber-attacks however use of with the application of layered security approach has proved to be very important in ensuring all the organization’s IT resources are well protected and the overall organizational security. Some of the security layers that have been implemented in our organization to ensure there is secured network defense includes firewalls, which is an essential part of any network security and cyberspace, another one is the endpoint, and end-user protection as where the organization employees store their desktops is very critical in mitigating the risk of attacks (Chau, 2018). Email filtering is another important security measure as our organization mainly communicates through emails, and there is an increased number of cyber attackers that target emails. Filtering emails is very critical for our organization as it helps in reducing the risk of infections and data breaches.

One of the interesting topics in the course is data encryption, which helps translate data into another form or code to ensure only those who have access get to the contents of the information.  Encryption is critical and one of the most popular and effective data security methods used by our organization.  Through the course, I have learned that there are two main types of data encryption that exist, known as asymmetric encryption (public-key encryption and symmetric encryption.

References

Chau, J. (2018). Application security – it all starts from here. Computer Fraud & Security, 2006(6), 7–9. https://doi.org/10.1016/s1361-3723(06)70366-9